Solaris Trusted Extensions Administrator's Procedures

Chapter 8 Trusted Extensions Administration Tools

This chapter describes the tools that are available in Solaris Trusted Extensions, the location of the tools, and the databases on which the tools operate.

Administration Tools for Trusted Extensions

Administration on a system that is configured with Trusted Extensions uses many of the same tools that are available in the Solaris OS. Trusted Extensions offers security-enhanced tools as well. Administration tools are available only to roles in a role workspace.

Within a role workspace, you can access commands, applications, and scripts that are trusted. The following table summarizes these administrative tools.

Table 8–1 Trusted Extensions Administrative Tools

Tool 

Description 

For More Information 

/usr/sbin/txzonemgr

Provides a menu-based wizard for creating, installing, initializing, and booting zones. 

The script also provides menu items for networking options, name services options, and for clienting the global zone to an existing LDAP server. txzonemgr uses the zenity command.

See Creating Labeled Zones

See also the zenity(1) man page.

In Solaris Trusted Extensions (GNOME), Device Manager

Used to administer the label ranges of devices, and to allocate or deallocate devices. 

See Device Manager and Handling Devices in Trusted Extensions (Task Map).

Solaris Management Console 

Used to configure users, roles, rights, hosts, zones, and networks. This tool can update local files or LDAP databases. 

This tool can also launch the dtappsession legacy application.

For basic functionality, see Chapter 2, Working With the Solaris Management Console (Tasks), in System Administration Guide: Basic Administration. For information that is specific to Trusted Extensions, see Solaris Management Console Tools.

Solaris Management Console commands, such as smuser and smtnzonecfg

Is the command-line interface for the Solaris Management Console. 

For a list, see Table 8–2.

Label Builder 

Is also a user tool. Appears when a program requires you to choose a label. 

For an example, see How to Modify a User's Label Range in the Solaris Management Console.

Trusted Extensions commands 

Used to perform tasks that are not covered by Solaris Management Console tools. 

For the list of administrative commands, see Table 8–3.

txzonemgr Script

In the Solaris Express Community Edition, the txzonemgr script is used to configure labeled zones. This zenity(1) script displays a dialog box with the title Labeled Zone Manager. This GUI presents a dynamically-determined menu that displays only valid choices for the current configuration status of a labeled zone. For instance, if a zone is already labeled, the Label menu item is not displayed.

Device Manager

A device is either a physical peripheral that is connected to a computer or a software-simulated device called a pseudo-device. Because devices provide a means for the import and export of data to and from a system, devices must be controlled to properly protect the data. Trusted Extensions uses device allocation and device label ranges to control data flowing through devices.

Examples of devices that have label ranges are frame buffers, tape drives, diskette and CD-ROM drives, printers, and USB devices.

Users allocate devices through the Device Manager. The Device Manager mounts the device, runs a clean script to prepare the device, and performs the allocation. When finished, the user deallocates the device through the Device Manager, which runs another clean script, and unmounts and deallocates the device.

You can manage devices by using the Device Administration tool from the Device Manager. Regular users cannot access the Device Administration tool.

For more information about device protection in Trusted Extensions, see Chapter 23, Managing Devices for Trusted Extensions (Tasks).

Solaris Management Console Tools

The Solaris Management Console provides access to toolboxes of GUI-based administration tools. These tools enable you to edit items in various configuration databases. In Trusted Extensions, the Solaris Management Console is the administrative interface for users, roles, and the trusted network databases.

Trusted Extensions extends the Solaris Management Console:

Solaris Management Console tools are collected into toolboxes according to scope and security policy. To administer Trusted Extensions, Trusted Extensions provides toolboxes whose Policy=TSOL. You can access tools according to scope, that is, according to naming service. The available scopes are local host and LDAP.

The Solaris Management Console is shown in the following figure. A Scope=Files Trusted Extensions toolbox is loaded, and the Users tool set is open.

Figure 8–1 Typical Trusted Extensions Toolbox in the Solaris Management Console

The context describes the graphic.

Trusted Extensions Tools in the Solaris Management Console

Trusted Extensions adds configurable security attributes to three tools:

Trusted Extensions adds two tools to the Computers and Networks tool set:

Figure 8–2 shows the Files toolbox with the Users tool set highlighted. The Trusted Extensions tools appear below the Computers and Networks tool set.

Figure 8–2 Computers and Networks Tool Set in the Solaris Management Console

Window shows icons for the Computers and Networks tool.
The icons are for Computers, Security Templates, and the networks 127,10,
and 192.168.

Security Templates Tool

A security template describes a set of security attributes that can be assigned to a group of hosts. The Security Templates tool enables you to conveniently assign a specific combination of security attributes to a group of hosts. These attributes control how data is packaged, transmitted, and interpreted. Hosts that are assigned to a template have identical security settings.

The hosts are defined in the Computers tool. The security attributes of the hosts are assigned in the Security Templates tool. The Modify Template dialog box contains two tabs:

Trusted networking and security templates are explained in more detail in Chapter 18, Trusted Networking (Overview).

Trusted Network Zones Tool

The Trusted Network Zones tool identifies the zones on your system. Initially, the global zone is listed. When you add zones and their labels, the zone names display in the pane. Zone creation usually occurs during system configuration. Label assignment, multilevel port configuration, and label policy is configured in this tool. For details, see Chapter 16, Managing Zones in Trusted Extensions (Tasks).

Client-Server Communication With the Solaris Management Console

Typically, a Solaris Management Console client administers systems remotely. On a network that uses LDAP as a naming service, a Solaris Management Console client connects to the Solaris Management Console server that runs on the LDAP server. The following figure shows this configuration.

Figure 8–3 Solaris Management Console Client Using an LDAP Server to Administer the Network

Solaris Management Console client talking to an LDAP
server that is running a Solaris Management Console server.

Figure 8–4 shows a network that is not configured with an LDAP server. The administrator configured each remote system with a Solaris Management Console server.

Figure 8–4 Solaris Management Console Client Administering Individual Remote Systems on a Network

Solaris Management Console client talking to several
remote systems. Each system is running a Solaris Management Console server.

Solaris Management Console Documentation

The main source of documentation for the Solaris Management Console is its online help. Context-sensitive help is tied to the currently selected feature and is displayed in the information pane. Expanded help topics are available from the Help menu or by clicking links in the context-sensitive help. Further information is provided in Chapter 2, Working With the Solaris Management Console (Tasks), in System Administration Guide: Basic Administration. Also see Using the Solaris Management Tools With RBAC (Task Map) in System Administration Guide: Basic Administration.

Label Builder in Trusted Extensions

The label builder GUI enforces your choice of a valid label or clearance when a program requires you to assign a label. For example, a label builder appears during login (see Chapter 3, Logging In to Trusted Extensions (Tasks), in Solaris Trusted Extensions User’s Guide). The label builder also appears when you change the label of a workspace, or when you assign a label to a user, zone, or network interface in the Solaris Management Console. The following label builder appears when you assign a label range to a new device.

Label builder titled Device Allocation Set Minimum Label
shows the labels that can be chosen as the minimum label for a device.

In the label builder, component names in the Classification column correspond to the CLASSIFICATIONS section in the label_encodings file. The component names in the Sensitivity column correspond to the WORDS section in the label_encodings file.

Command Line Tools in Trusted Extensions

Commands that are unique to Trusted Extensions are contained in the Solaris Trusted Extensions Reference Manual. The Solaris commands that Trusted Extensions modifies are contained in the Solaris Reference Manual. The man command finds all the commands.

The following table lists commands that are unique to Trusted Extensions. The commands are listed in man page format.

Table 8–2 User and Administrative Trusted Extensions Commands

Man Page 

Trusted Extensions Modification 

For More Information 

add_allocatable(1M)

Enables a device to be allocated by adding the device to device allocation databases. By default, removable devices are allocatable. 

How to Configure a Device in Trusted Extensions

atohexlabel(1M)

Translates a label into hexadecimal format. 

How to Obtain the Hexadecimal Equivalent for a Label

chk_encodings(1M)

Checks the integrity of the label_encodings file.

How to Debug a label_encodings File in Solaris Trusted Extensions Label Administration

     

getlabel(1)

Displays the label of the selected files or directories. 

How to Display the Labels of Mounted Files

getzonepath(1)

Displays the full pathname of a specific zone. 

Acquiring a Sensitivity Label in Solaris Trusted Extensions Developer’s Guide

hextoalabel(1M)

Translates a hexadecimal label into its readable equivalent. 

How to Obtain a Readable Label From Its Hexadecimal Form

plabel(1)

Displays the label of the current process. 

See the man page. 

remove_allocatable(1M)

Prevents allocation of a device by removing its entry from device allocation databases. 

How to Configure a Device in Trusted Extensions

setlabel(1)

Relabels the selected item. Requires the solaris.label.file.downgrade or solaris.label.file.upgrade authorization. These authorizations are in the Object Label Management rights profile.

 

smtnrhdb(1M)

Manages entries in the tnrhdb database locally or in a naming service database.

For equivalent procedures that use the Solaris Management Console, see Configuring Trusted Network Databases (Task Map).

smtnrhtp(1M)

Manages entries in the tnrhtp database locally or in a naming service database.

See the man page. 

smtnzonecfg(1M)

Manages entries in the local tnzonecfg database.

For an equivalent procedure that uses the Solaris Management Console, see How to Create a Multilevel Port for a Zone.

tnchkdb(1M)

Checks the integrity of the tnrhdb and tnrhtp databases.

How to Check the Syntax of Trusted Network Databases

tnctl(1M)

Caches network information in the kernel. 

How to Synchronize the Kernel Cache With Trusted Network Databases

tnd(1M)

Executes the trusted network daemon. 

How to Synchronize the Kernel Cache With Trusted Network Databases

tninfo(1M)

Displays kernel-level network information and statistics. 

How to Compare Trusted Network Database Information With the Kernel Cache.

updatehome(1M)

Updates .copy_files and .link_files for the current label.

How to Configure Startup Files for Users in Trusted Extensions

The following table lists Solaris commands that are modified or extended by Trusted Extensions. The commands are listed in man page format.

Table 8–3 User and Administrative Commands That Trusted Extensions Modifies

Man Page 

Purpose of Command 

For More Information 

allocate(1)

Adds options to clean the allocated device, and to allocate a device to a specific zone. In Trusted Extensions, regular users do not use this command. 

How to Allocate a Device in Trusted Extensions in Solaris Trusted Extensions User’s Guide

deallocate(1)

Adds options to clean the device, and to deallocate a device from a specific zone. In Trusted Extensions, regular users do not use this command. 

How to Allocate a Device in Trusted Extensions in Solaris Trusted Extensions User’s Guide

list_devices(1)

Adds the -a option to display device attributes, such as authorizations and labels. Adds the -d option to display the default attributes of an allocated device type. Adds the -z option to display available devices that can be allocated to a labeled zone.

See the man page. 

tar(1)

Adds the -T option to archive and extract files and directories that are labeled.

How to Back Up Files in Trusted Extensions and How to Restore Files in Trusted Extensions

auditconfig(1M)

Adds the windata_down and windata_up audit policy options.

How to Configure Audit Policy in System Administration Guide: Security Services

auditreduce(1M)

Adds the -l option to select audit records by label.

How to Select Audit Events From the Audit Trail in System Administration Guide: Security Services

automount(1M)

Modifies the names and contents of auto_home maps to account for zone names and zone visibility from higher labels.

Changes to the Automounter in Trusted Extensions

ifconfig(1M)

Adds the all-zones option to make an interface available to every zone on the system.

How to Verify That a Host's Interfaces Are Up

netstat(1M)

Adds the -R option to display extended security attributes for sockets and routing table entries.

How to Debug the Trusted Extensions Network

route(1M)

Adds the -secattr option to display the security attributes of the route: cipso, doi, max_sl, and min_sl.

How to Configure Routes With Security Attributes

ikeadm(1M)

Adds a debug flag, 0x0400, for label processing.

See the man page. 

in.iked(1M)

In the global zone, uses two multilevel ports, UDP ports 500 and 4500, to negotiate labeled security associations. 

See the ike.config(4) man page.

ipseckey(1M)

Adds the label, outer-label, and implicit-label extensions. These extensions associate Trusted Extensions labels with the traffic that is carried inside a security association.

See the man page. 

Configuration Files in Trusted Extensions

The following Solaris configuration files are modified or extended by Trusted Extensions. The files are introduced in man page format.

Remote Administration in Trusted Extensions

You can remotely administer a system that is configured with Trusted Extensions by using the ssh command, the dtappsession program, or the Solaris Management Console. If site security policy permits, you can configure a Trusted Extensions host to enable login from a non-Trusted Extensions host, although this configuration is less secure. For more information, see Chapter 14, Remote Administration in Trusted Extensions (Tasks).